Computer Installation and upgrade-1
Computer Installation and upgrade-1
Upgrading is the process of replacing a product with a newer version of the same product. In
computing and consumer electronics an upgrade is generally a replacement of hardware,
software or firmware with a newer or better version, in order to bring the system up to date
or to improve its characteristics/performance. With computer hardware, an upgrade is the
adding of a new hardware in a computer that improves its performance. For example, with a
hardware upgrade, you replace your hard drive with an SSD or upgrade the RAM, providing a
boost in performance and efficiency. When referring to software, a software upgrade is an
upgrade to the software that adds significant or completely new changes to the program. An
example of a software upgrade is upgrading your version of Windows from Microsoft
Windows XP and upgraded to Windows 7, it would be considered a software upgrade.
Users can often download software and firmware upgrades from the Internet. Often the
download is a patch—it does not contain the new version of the software in its entirety, just
the changes that need to be made. Although developers usually produce upgrades in order
to improve a product, there are risks involved—including the possibility that the upgrade will
worsen the product. Upgrades of hardware involve a risk that new hardware will not be
compatible with other pieces of hardware in a system. For example, an upgrade of RAM may
not be compatible with existing RAM in a computer. Other hardware components may not
be compatible after either an upgrade or downgrade, due to the non-availability of
compatible drivers for the hardware with a specific operating system. Conversely, there is
the same risk of non-compatibility when software is upgraded or downgraded for previously
functioning hardware to no longer function.
Basic definitions
POST
This is an abbreviation for Power On Self Test. It is a process performed by firmware or
software routines immediately after a computer or other electronic devices is powered on. It
is also a diagnostic testing sequence that a computer’s basic input/output system (starting
program) runs to determine if the computer keyboard, RAM, disk drives and other hardware
are working correctly.
The first thing that the BIOS does when it boots the PC is to perform what is called the
PowerOn Self-Test, or POST for short. The POST is a built-in diagnostic program that checks
the hardware to ensure that everything is present and functioning properly, before the BIOS
begins the actual boot. It later continues with additional tests such as the memory test and
then it lists any devices that it finds attached to the computer’s internal IDE controller(s).
(that is seen on the screen of the monitor) as the boot process is proceeding.
The POST runs very quickly, and you will normally not even notice that it is happening--
unless it finds a problem. You may have encountered a PC that, when turned on, made
beeping sounds and then stopped without booting up. That is the POST telling you
something is wrong with the machine. The speaker is used because this test happens so
early on, before the video is activated! These beep patterns can be used to diagnose many
hardware problems with the PC. The exact patterns depend on the maker of the BIOS; the
most common are Award and AMI BIOS.
Troubleshooting
Troubleshooting is a systematic process used to locate the cause of a fault in a computer
system and correct the relevant hardware and software issues. It is also define as a process
of identifying, planning and resolving a problem, errors, or faults within a software or
computer system.
Maintenance
This has to do with both the hardware and the software which involves testing and cleaning
of equipment, and updating of application programs in order to make changing information
requirement such as adding new functions and changing data formats. It is also the
replacement of faulty unit with similar, or any other activity (cleaning, dust extraction) that
restores, or keeps the machine at its previous level of performance.
Backup
This is the process of copying into an archive, files of computer data that is already in
secondary storage so that it may be used to restore the original file after a data loss events.
Configuration
This is the arrangement of each of the computer’ system units according to to their nature,
number and chief characteristics which pertain to the choice of hardware, software,
firmware and documentation. It is the choice made in setting up a computer system or an
application program so that it meets the user’s guide.
Firmware
This refers to computer code that is somewhere between hardware and software. It is a type
of computer program that provide the low level control for the device specific hardware.
Computer installation
Installation refers to the particular configuration of a software or hardware with a view to
making it usable with the computer. A soft or digital copy of the piece of software (program)
is needed to install it. There are different processes of installing a piece of software
(program). Because the process varies for each program and each computer, programs
(including operating systems) often come with an installer, a specialized program responsible
for doing whatever is needed for the installation. Installation may be part of a larger
software deployment process. Some computer programs can be executed by simply copying
them into a folder stored on a computer and executing them. Other programs are supplied
in a form unsuitable for immediate execution and therefore need an installation procedure.
Once installed, the program can be executed again and again, without the need to reinstall
before each execution. Common operations performed during software installations include:
Making sure that necessary system requirements are met
Checking for existing versions of the software
Creating or updating program files and folders
Adding configuration data such as configuration files, Windows registry entries or
environment variables
Making the software accessible to the user, for instance by creating links, shortcuts
or bookmarks
Configuring components that run automatically, such as daemons or Windows
services
Performing product activation
Updating the software versions
Types of Installation
1. Attended installation
On Windows systems, this is the most common form of installation. An installation
process usually needs a user who attends it to make choices, such as accepting or
declining an end-user license agreement (EULA), specifying preferences such as the
installation location, supplying passwords or assisting in product activation. In
graphical environments, installers that offer a wizard-based interface are common.
Attended installers may ask users to help mitigate the errors. For instance, if the disk
in which the computer program is being installed was full, the installer may ask the
user to specify another target path or clear enough space in the disk. A common
misconception is unarchivation, which is not considered an installation action
because it does not include user choices, such as accepting or declining EULA.
2. Silent installation: Installation that does not display messages or windows during its
progress. "Silent installation" is not the same as "unattended installation". All silent
installations are unattended but not all unattended installations are silent. The
reason behind a silent installation may be convenience or subterfuge. Malware is
almost always installed silently.
3. Unattended installation: Installation that is performed without user interaction
during its progress or with no user present at all. One of the reasons to use this
approach is to automate the installation of a large number of systems. An
unattended installation either does not require the user to supply anything or has
received all necessary input prior to the start of installation. Such input may be in the
form of command line switches or an answer file, a file that contains all the
necessary parameters. Windows XP and most Linux distributions are examples of
operating systems that can be installed with an answer file. In unattended
installation, it is assumed that there is no user to help mitigate errors. For instance, if
the installation medium was faulty, the installer should fail the installation, as there is
no user to fix the fault or replace the medium. Unattended installers may record
errors in a computer log for later review.
4. Headless installation: Installation performed without using a computer monitor
connected. In attended forms of headless installation, another machine connects to
the target machine (for instance, via a local area network) and takes over the display
output. Since a headless installation does not need a user at the location of the
target computer, unattended headless installers may be used to install a program on
multiple machines at the same time.
5. Scheduled or automated installation: An installation process that runs on a preset
time or when a predefined condition transpires, as opposed to an installation process
that starts explicitly on a user's command. For instance, a system administrator
willing to install a later version of a computer program that is being used can
schedule that installation to occur when that program is not running. An operating
system may automatically install a device driver for a device that the user connects.
(See plug and play.) Malware may also be installed automatically. For example, the
infamous Conficker was installed when the user plugged an infected device to their
computer.
6. Clean installation A clean installation is one that is done in the absence of any interfering
elements such as old versions of the computer program being installed or leftovers from a
previous installation. In particular, the clean installation of an operating system is an
installation in which the target disk partition is erased before installation. Since the
interfering elements are absent, a clean installation may succeed where an unclean
installation may fail or may take significantly longer.
7. Network installation Not to be confused with network booting Network installation,
shortened net-install, is an installation of a program from a shared network resource that
may be done by installing a minimal system before proceeding to download further packages
over the network. This may simply be a copy of the original media but software publishers
which offer site licenses for institutional customers may provide a version intended for
installation over a network.
1. Differentiate between troubleshooting and maintenance
2. State five reasons why we need to upgrade a system
3. List five reasons why a system freezes
Computer Maintenance
Computer maintenance is the keeping of a computer in a good state of repair and physical
health i.e., it is set of maintenance tasks and procedures that help to keep the computer
software and hardware updated and operational.
Maintenance Tasks and Procedures Computer maintenance tasks include reviewing the computer’s
performance, ensuring that automated system monitoring utilities are properly installed and
configured, identifying potential security risks and backing up data at regular intervals. The
maintenance procedure is part of a wider policy which defines what, how, and when the required
changes can occur. The procedure also defines step by step low-level actions.
Maintenance Plan
A solid computer maintenance plan generally requires several steps, including:
Checking computer log files
Assessing hard disk space
Examining computer folder permissions
Monitoring computer temperature
Ensuring adequate redundancy of computer systems
Examining security features
Examining computer cleaning
Installing security software patches, Reading computer logs for security alerts or evidence of
computer hacking attempts
Updating antivirus software on all computers on the network
Updating critical service packs and software updates
Performing regular comprehensive back-ups to ensure that vital data can be retrieved from
storage in the event of a system failure.
Types of Maintenance
Preventive Maintenance: This type is used to prevent possible failures. It helps to improve
the functioning of a system and lengthen the life of various components on the computer.
The benefit of this type of maintenance are that it allows noticing weak points in the system
and lead to lesser number of repairs.
Corrective Maintenance: There is a need to find out what caused the problem and then fix it.
This has to do with repairs, changing of faulty parts etc.
Predictive Maintenance: In this type, the PC user turns to diagnostic tools to prevent possible
problems with the computer. The diagnostic tools monitor computer system and check
whether the functioning is normal. For example, such tools control and inform you about the
temperature of the CPU, battery levels and many other features.
1. State four maintenance tools and explain theirs functions
2. Draw any five of the tools mentioned above
3. Explain the effect of electrostatic discharge (ESD) and how can it be avoided